2017
DOI: 10.14569/ijacsa.2017.080813
|View full text |Cite
|
Sign up to set email alerts
|

Synchronous Authentication Key Management Scheme for Inter-eNB Handover over LTE Networks

Abstract: Abstract-Handover process execution without active session termination is considered one of the most important attribute in the Long Term Evolution (LTE) networks. Unfortunately, this service always is suffered from the growing of security threats. In the Inter-eNB handover, an attacker may exploit these threats to violate the user privacy and desynchronize the handover entities. Therefore, the authentication is the main challenge in such issue. This paper proposes a synchronous authentication scheme to enhanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5

Relationship

4
1

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Moreover, unauthorized access to the sensitive data that have been collected by the sensor nodes can lead to a loss of employment or government health benefits for the patient, as well as inaccurate or fabricated medical records [3]. Furthermore, other types of attacks can be carried out due to the limited capabilities of the sensor nodes, such as smartcard loss, removing the anonymity of the healthcare professionals or patients, and man-in-the-middle, impersonation, insider, desynchronization, and replay attacks [3][4][10][11][12][13][14][15]. Therefore, the primary concern when implementing a healthcare system is ensuring the confidentiality, availability, and integrity of the services in order to protect the patients' privacy and the data that are transmitted between the different elements of the system [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, unauthorized access to the sensitive data that have been collected by the sensor nodes can lead to a loss of employment or government health benefits for the patient, as well as inaccurate or fabricated medical records [3]. Furthermore, other types of attacks can be carried out due to the limited capabilities of the sensor nodes, such as smartcard loss, removing the anonymity of the healthcare professionals or patients, and man-in-the-middle, impersonation, insider, desynchronization, and replay attacks [3][4][10][11][12][13][14][15]. Therefore, the primary concern when implementing a healthcare system is ensuring the confidentiality, availability, and integrity of the services in order to protect the patients' privacy and the data that are transmitted between the different elements of the system [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…With the growing demand for healthcare IoT systems, many healthcare IoT authentication schemes have been proposed to resolve the security weaknesses and to prevent different types of attack that target the patient's privacy and the integrity of remote clinical diagnostics [12][13][14][15][16][17][18][19][20]. These attacks can be summarized as the password table attack, man-in-the-middle attack, wrong login information attack, replay attack, impersonate attack, insider attack, smart card loss attack, and desynchronization attack [21][22][23][24][25]. Most healthcare IoT authentication schemes that have been proposed are unable to prevent all these attacks, especially the desynchronization attack [26,27].…”
Section: Introductionmentioning
confidence: 99%
“…Usually, to maintain consistency and synchronization between the communication nodes in such systems, the authentication schemes use different synchronization techniques, such as random numbers, pseudonym identities, timestamps, serial numbers, and hash functions [11][12][13][14][15][16][17][18][19][20][21][22][23][24]. Therefore, the improper use of such techniques to renew the nodes' identities and the session keys that will be used in the next authentication sessions may lead to extensive computational costs to prevent desynchronization attacks [25,28].…”
Section: Introductionmentioning
confidence: 99%
“…One of the promising authentication schemes proposed to enhance the security features of the LTE network is a secure anonymity key of authentication and key agreement (SAK-AKA) scheme [3]. The SAK-AKA scheme can support attractive security services such as full mutual authentication, perfect forward secrecy, and anonymity services [3], [4], [5], [6] [7]. Furthermore, the SAK-AKA scheme can resist numerous types of related attacks such as the denial of service (DOS), replay, desynchronization, and man-in-the-middle attacks [8], [10], [11].…”
Section: Introductionmentioning
confidence: 99%